CVE-2024-0536Stack-based Buffer Overflow in W9

Severity
9.8CRITICALNVD
CNA8.8
EPSS
0.1%
top 66.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 15

Description

A vulnerability, which was classified as critical, has been found in Tenda W9 1.0.0.7(4456). Affected by this issue is the function setWrlAccessList of the component httpd. The manipulation of the argument ssidIndex leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-250706 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

CVEListV5tenda/w91.0.0.7(4456)
NVDtenda/w9_firmware1.0.0.7\(4456\)

🔴Vulnerability Details

2
GHSA
GHSA-qp9j-573m-xrwq: A vulnerability, which was classified as critical, has been found in Tenda W9 12024-01-15
CVEList
Tenda W9 httpd setWrlAccessList stack-based overflow2024-01-15
CVE-2024-0536 — Stack-based Buffer Overflow in Tenda W9 | cvebase